Search dblp for Publications

export results for "toc:db/journals/ijipt/ijipt16.bht:"

 download as .bib file

@article{DBLP:journals/ijipt/GambhavaB23,
  author       = {Bhavika Gambhava and
                  C. K. Bhensdadia},
  title        = {Mathematical modelling of packet transmission during reclamation period
                  in NewReno {TCP} and {CTCP}},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {110--118},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.131296},
  doi          = {10.1504/IJIPT.2023.131296},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/GambhavaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/GripsyK23,
  author       = {J. Viji Gripsy and
                  K. R. Kanchana},
  title        = {Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc
                  networks},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {92--98},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.131292},
  doi          = {10.1504/IJIPT.2023.131292},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/GripsyK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/HamamrehAA23,
  author       = {Rushdi A. Hamamreh and
                  Mohammed R. Ayyad and
                  Mohammed AbuTaha},
  title        = {{RAD:} reinforcement authentication model based on {DYMO} protocol
                  for {MANET}},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {46--57},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10054906},
  doi          = {10.1504/IJIPT.2023.10054906},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/HamamrehAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/IqbalM23,
  author       = {Ummer Iqbal and
                  Ajaz Hussain Mir},
  title        = {Practical and scalable access control mechanism for wireless sensor
                  networks},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {11--33},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10054904},
  doi          = {10.1504/IJIPT.2023.10054904},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/IqbalM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/JaiswalP23,
  author       = {Vivek Kumar Jaiswal and
                  Sanjeev Patel},
  title        = {A comparative performance analysis of {TCP} congestion control algorithm:
                  elastic {TCP} vs. e-Elastic {TCP}},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {161--175},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.133029},
  doi          = {10.1504/IJIPT.2023.133029},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/JaiswalP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/KangD23,
  author       = {Hai{-}Yan Kang and
                  Jie Deng},
  title        = {A cross encryption scheme for data security storage in cloud computing
                  environment},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {1--10},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10054903},
  doi          = {10.1504/IJIPT.2023.10054903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/KangD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/KangFSL23,
  author       = {Haiyan Kang and
                  Yaping Feng and
                  Xiameng Si and
                  Kaili Lu},
  title        = {Research on personalised privacy-preserving model of multi-sensitive
                  attributes},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {58--67},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10054907},
  doi          = {10.1504/IJIPT.2023.10054907},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/KangFSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/Luo23,
  author       = {Wei Luo},
  title        = {Cognitive wireless communication network information sharing method
                  based on blockchain technology},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {99--109},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.131294},
  doi          = {10.1504/IJIPT.2023.131294},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/Luo23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/MouakherDA23,
  author       = {In{\`{e}}s Mouakher and
                  Fatma Dhaou and
                  J. Christian Attiogb{\'{e}}},
  title        = {Validating and verifying LwM2M clients with event-B},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {75--91},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.131291},
  doi          = {10.1504/IJIPT.2023.131291},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/MouakherDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/NeelamS23,
  author       = {Bhushana Samyuel Neelam and
                  Benjamin A. Shimray},
  title        = {Improved network performance in {CPS} communication with distributed
                  {IPC} mechanisms of recursive internetworking architecture {(RINA)}},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {68--74},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10045826},
  doi          = {10.1504/IJIPT.2023.10045826},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/NeelamS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/PatilAP23,
  author       = {Sandeep Patil and
                  Lalita Admuthe and
                  Meenakshi R. Patil},
  title        = {{SNTAM:} secure neuro-fuzzy-based trusted neighbour selection and
                  attackers detection in multipath ad-hoc network},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {119--130},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.131307},
  doi          = {10.1504/IJIPT.2023.131307},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/PatilAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/PrasadP23,
  author       = {Shilpee Prasad and
                  B. R. Purushothama},
  title        = {Secure and verifiable outsourcing of Euclidean distance and closest
                  pair of points with single untrusted cloud server},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {34--45},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.10054905},
  doi          = {10.1504/IJIPT.2023.10054905},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/PrasadP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/PrasadSDK23,
  author       = {S. Narasimha Prasad and
                  K. Senthamil Selvan and
                  B. Lakshmi Dhevi and
                  A. Niranjil Kumar},
  title        = {Computation on scheduling attacks and optimal resource utilisation
                  in wireless sensor networks via optimisation techniques},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {131--137},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.133026},
  doi          = {10.1504/IJIPT.2023.133026},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/PrasadSDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/VermaD23,
  author       = {Ankit Verma and
                  Suman Deswal},
  title        = {Efficient routing protocol for IoT networks based on fog computing
                  and routing protocol of low-power lossy networks},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {176--184},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.133031},
  doi          = {10.1504/IJIPT.2023.133031},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/VermaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/YuQ23,
  author       = {Tianfang Yu and
                  Xue{-}Song Qiu},
  title        = {Towards a transmission control mechanism for data centres based on
                  flow deadline and size over software defined networking},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {148--160},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.133030},
  doi          = {10.1504/IJIPT.2023.133030},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/YuQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/ZebaA23,
  author       = {Sana Zeba and
                  Mohammad Amjad},
  title        = {Distribution and tracking current live location of recognised criminal
                  face at decentralised blockchain through image},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {138--147},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPT.2023.133028},
  doi          = {10.1504/IJIPT.2023.133028},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/ZebaA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics